Too Fit To Hack?

We’ve become aware of two more major cyber security breach events over the past several days.

First, Under Armour went public with the news that in February around 150 million MyFitnessPal user accounts were hacked, stating that “an unauthorized party acquired data associated with MyFitnessPal user accounts.”

That data included usernames, passwords, and email addresses, but not bank, driving license or social security information.

No word on whether or not how many steps you took on average per day was revealed!

And The New York Times is reporting that a well-known ring of cybercriminals has obtained more than five million credit and debit card numbers from customers of Saks Fifth Avenue and Lord & Taylor.

The company indicated that the data appears to have been stolen using software that was implanted into the cash register systems at the stores and that siphoned card numbers.

Hudson’s Bay, the Canadian company that owns both firms, suggested that its e-commerce platforms appeared to have been unaffected by the breach.

The Times’ story suggests that the Lord & Taylor theft is one of the largest known breaches of a retailer, and demonstrates how difficult it is to secure credit-card transaction systems.

Check out this white paper from IBM Security to learn more how your organization can take a proactive approach to threat detection and prevention.

P.S. Another one that missed my radar…Boeing was hacked by the “WannaCry” virus last week. CBSNews reported Boeing announced that it “detected a limited intrusion of malware” that “infiltrated “a small number of systems.”

An initial report from chief engineer Mike VanderWel at Boeing Commercial Airplane production engineering that “the virus would affect equipment used in functionality tests of airplanes and potentially ‘spread to airplane software’” and that it was metastasizing rapidly.”